Last week was the 6th annual Army Cyber Skills Challenge (ACSC) hosted by my home unit, 780th MI Brigade. If you don’t recall, I first wrote about ACSC about this time last year. This was the 2nd year in a row that I served as the OIC for the event, and it was truly bigger »

Back in November I had the chance to attend the Splunk .conf conference here in DC. One of the big after hours events of the conference is the Boss of the SOC (BOTS) competition that puts teams against each other to try and analyze a set of data to identify a variety of indicators of compromise from an incident. After a little bit of talking, Splunk decided to release the BOTS app as an open-source project.

Here is another CTF problem from last years Army Cyber Stakes Challenge. You are provided a solid line of characters (see below) and have to turn it into the flag. The trick is that because there aren’t any line breaks, you have to figure it out.

Another problem from ACSC5. You’ve been able to get on a router and capture some traffic in an effort to map out the the corporate network. Your intelligence team has told you that your target device has an IP address of 172.16.58.47 but no one knows that actual location of it. Examine the network traffic and see if you can figure out the location of that device.

The is a follow-on to the first find_the_stack problem from ACSC5. This was originally supposed to be the third one in a series of challenges based on this problem but I had some problems with number two so this became number two.

This is the first of what will hopefully be many walk-throughs from various CTF competitions I’ve competed/worked on. This first challenge is a simple one that I created for the 5th annual Army Cyber Skills Challenge.

The opinions expressed here are those solely of the author and are not the official (or unofficial) opinions of the US Army
Unless otherwise noted, all content contained on this site is copyright by Troy Ward 2014 - 2018 and protected by federal Copyright Law.
Troy Ward
TheSignalChief@gmail.com